Tom Eastep wrote:

> mess-mate wrote:
>> Tom Eastep wrote:
>>
>>> mess-mate wrote:
>>>> Hi,
>>>>
>>>> can anybody help me  translate this iptable to a shorewall rule :
>>>>
>>>> iptables -t NAT -A POSTROUTING -s GUEST_IP -j SNAT --to-source HOST_IP
>>>>
>>>> Host ip = xx.xx.xx.xx,  guest ip subnet is yy.yy.yy.yy/255.255.255.0
>>>> *
>>> What problem are you trying to solve? I would be surprised if you
>>> don't already have an entry in /etc/shorewall/masq that does what you
>>> want.
>>>
>>> -Tom
>>>
>> Thanks for the reply. I'm very new to shorewall and say to iptables
>> to :(
>> What i try to solve is this:
>
> <Mostly useless information deleted>
>
> Mess-mate,
>
> Please follow the advice that Martin Leben has already given you and
> go to http://www.shorewall.net/support.htm#Guidelines and follow the
> instructions for submitting a useful problem report.
>
> Without knowing what you configuration really looks like, we would
> just be guessing about what is wrong and how to correct it.
>
> But here are a couple of tips:
>
> a) Be sure that IP_FORWARDIG=Yes in shorewall.conf
> b) Be sure that there is an entry for your DMZ in /etc/shorewall/masq.
> c) Be sure that you have the required DNAT rule(s) in place to allow
> your webserver to be accessed from the net (note: you will _not_ be
> able to ping your webserver from the net).
>
> -Tom
>
> ------------------------------------------------------------------------
>
>   
Hi,
attached the statux.txt.
a) it is
b)the machine is located in the dmz zone and is running very well
without any  entry  in /etc/shorewall/masq, for now
c) no nat rules. The DNAT rule is given in the router machine and
redirect to my website actually on the host .
      DNAT    $FW     dmz:192.168.20.1     tcp     80      -   $ETH0_IP
And i want my website in the vservers guest, so dmz:192.168.20.1 shall
become dmz:192.168.30.1 in the future when my problem is solved.

I consulted the guidelines, suport and many others before asking for
help, but nothing about this situation.

There is no firewall on the guest.

Hope i clarify a little bit more :(

internet
     |
 modem
     |
   ppp0
     |                                 machine 2 (dmz zone)
machine 1             
--------------------------------------------------------------|
-------------                  |  eth2                   
-----------------------------|  |
|router | -------------> | server (host) --> |  vserver (guest) | |
| eth0   |                  |  192.168.20.1      |     192.168.30.1   | |
-------------                  |  firewall               |      no
firewall     | |
      |                        |                             
-----------------------------|  |
      |                       
---------------------------------------------------------------|
      |         
 loc (eth1)
lan machines

                               

best regards
Shorewall-3.2.6 Dump at serv - mercredi 16 avril 2008, 09:30:01 (UTC+0200)

Counters reset mardi 15 avril 2008, 20:12:01 (UTC+0200)

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
35747 7025K ACCEPT     0    --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
20736 3793K eth1_in    0    --  eth1   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 Reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:' 
    0     0 reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 eth1_fwd   0    --  eth1   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 Reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:' 
    0     0 reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
35747 7025K ACCEPT     0    --  *      lo      0.0.0.0/0            0.0.0.0/0   
        
17316 3134K fw2dmz     0    --  *      eth1    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 
    0     0 Reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:' 
    0     0 reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain Drop (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 
    0     0 dropBcast  0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 
    0     0 dropInvalid  0    --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 
    0     0 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 

Chain Reject (5 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 
   11   924 dropBcast  0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 
   11   924 dropInvalid  0    --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 
    0     0 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 

Chain all2all (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:' 
    0     0 reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain dmz2all (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
   11   924 Reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
   11   924 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:dmz2all:REJECT:' 
   11   924 reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain dmz2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
20646 3787K ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     tcp  --  *      *       192.168.10.6         0.0.0.0/0   
        tcp dpt:81 
    0     0 ACCEPT     tcp  --  *      *       192.168.10.6         0.0.0.0/0   
        tcp dpt:55555 
    0     0 ACCEPT     tcp  --  *      *       192.168.10.6         0.0.0.0/0   
        tcp dpt:7070 
    0     0 ACCEPT     tcp  --  *      *       192.168.10.6         0.0.0.0/0   
        tcp dpt:10000 
    8   480 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:22 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:25 
    1    60 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:80 
    0     0 ACCEPT     tcp  --  *      *       192.168.20.254       0.0.0.0/0   
        tcp dpt:80 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:443 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:123 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:21 
   70  3912 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:143 
    0     0 ACCEPT     icmp --  *      *       192.168.10.2         0.0.0.0/0   
        icmp type 8 
    0     0 ACCEPT     icmp --  *      *       192.168.10.4         0.0.0.0/0   
        icmp type 8 
    0     0 ACCEPT     icmp --  *      *       192.168.10.6         0.0.0.0/0   
        icmp type 8 
   11   924 dmz2all    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain dropBcast (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = broadcast 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = multicast 

Chain dropInvalid (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID 

Chain dropNotSyn (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:!0x17/0x02 

Chain dynamic (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain eth1_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 

Chain eth1_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   90  5376 dynamic    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
20736 3793K dmz2fw     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        policy match dir in pol none 

Chain fw2dmz (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
16764 3100K ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:25 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:80 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:21 
  552 34386 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logdrop (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:logdrop:DROP:' 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logreject (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:logreject:REJECT:' 
    0     0 reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain reject (12 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       0    --  *      *       255.255.255.255      0.0.0.0/0   
        
    0     0 DROP       0    --  *      *       224.0.0.0/4          0.0.0.0/0   
        
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = broadcast 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = multicast 
    0     0 DROP       0    --  *      *       255.255.255.255      0.0.0.0/0   
        
    0     0 DROP       0    --  *      *       224.0.0.0/4          0.0.0.0/0   
        
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with tcp-reset 
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-port-unreachable 
   11   924 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-unreachable 
    0     0 REJECT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-prohibited 

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain smurfs (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        0    --  *      *       192.168.20.255       0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       0    --  *      *       192.168.20.255       0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       192.168.30.255       0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       0    --  *      *       192.168.30.255       0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       255.255.255.255      0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       0    --  *      *       255.255.255.255      0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       224.0.0.0/4          0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       0    --  *      *       224.0.0.0/4          0.0.0.0/0   
        

Log (/var/log/messages)

Apr 16 09:12:15 dmz2all:REJECT:IN=eth1 OUT= SRC=192.168.20.254 DST=192.168.30.1 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=16897 
SEQ=1 
Apr 16 09:12:16 dmz2all:REJECT:IN=eth1 OUT= SRC=192.168.20.254 DST=192.168.30.1 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=16897 
SEQ=2 
Apr 16 09:12:17 dmz2all:REJECT:IN=eth1 OUT= SRC=192.168.20.254 DST=192.168.30.1 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=16897 
SEQ=3 

NAT Table

Chain PREROUTING (policy ACCEPT 54 packets, 3504 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain POSTROUTING (policy ACCEPT 1477 packets, 90551 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 1477 packets, 90551 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Mangle Table

Chain PREROUTING (policy ACCEPT 56483 packets, 11M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
56483   11M tcpre      0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain INPUT (policy ACCEPT 56483 packets, 11M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 tcfor      0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy ACCEPT 360K packets, 139M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
53063   10M tcout      0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain POSTROUTING (policy ACCEPT 53063 packets, 10M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
53063   10M tcpost     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain tcfor (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcout (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpost (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpre (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Conntrack Table

tcp      6 431912 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=57657 
dport=22 packets=233 bytes=15259 src=192.168.20.1 dst=192.168.10.6 sport=22 
dport=57657 packets=233 bytes=61667 [ASSURED] mark=0 secmark=0 use=1
tcp      6 31 TIME_WAIT src=192.168.10.6 dst=192.168.20.1 sport=57656 dport=22 
packets=16 bytes=2119 src=192.168.20.1 dst=192.168.10.6 sport=22 dport=57656 
packets=14 bytes=2519 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431457 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=60273 
dport=143 packets=25 bytes=1905 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=60273 packets=16 bytes=2062 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431427 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=60269 
dport=143 packets=48 bytes=2896 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=60269 packets=35 bytes=7330 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431457 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=57690 
dport=143 packets=31 bytes=1970 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=57690 packets=27 bytes=3178 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431999 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=55790 
dport=22 packets=569 bytes=44026 src=192.168.20.1 dst=192.168.10.6 sport=22 
dport=55790 packets=375 bytes=116295 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431457 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=57692 
dport=143 packets=32 bytes=2610 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=57692 packets=26 bytes=3164 [ASSURED] mark=0 secmark=0 use=1
tcp      6 30 TIME_WAIT src=192.168.10.6 dst=192.168.20.1 sport=57653 dport=22 
packets=14 bytes=2015 src=192.168.20.1 dst=192.168.10.6 sport=22 dport=57653 
packets=14 bytes=2519 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431457 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=60265 
dport=143 packets=33 bytes=2429 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=60265 packets=25 bytes=2994 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431457 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=60264 
dport=143 packets=41 bytes=2521 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=60264 packets=31 bytes=3314 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431457 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=57691 
dport=143 packets=28 bytes=2255 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=57691 packets=24 bytes=3135 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431457 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=57693 
dport=143 packets=24 bytes=2014 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=57693 packets=17 bytes=2384 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431428 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=60312 
dport=143 packets=49 bytes=3133 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=60312 packets=38 bytes=20861 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431427 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=60270 
dport=143 packets=578 bytes=42946 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=60270 packets=523 bytes=155674 [ASSURED] mark=0 secmark=0 use=1
tcp      6 31 TIME_WAIT src=192.168.10.6 dst=192.168.20.1 sport=57655 dport=22 
packets=27 bytes=4563 src=192.168.20.1 dst=192.168.10.6 sport=22 dport=57655 
packets=26 bytes=4007 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431427 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=60263 
dport=143 packets=561 bytes=40543 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=60263 packets=552 bytes=202344 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431427 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=60277 
dport=143 packets=161 bytes=12071 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=60277 packets=125 bytes=45836 [ASSURED] mark=0 secmark=0 use=1
tcp      6 429635 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=60266 
dport=143 packets=25 bytes=1556 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=60266 packets=21 bytes=2412 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431457 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=57689 
dport=143 packets=37 bytes=3111 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=57689 packets=33 bytes=4473 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431457 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=57688 
dport=143 packets=29 bytes=1861 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=57688 packets=27 bytes=3394 [ASSURED] mark=0 secmark=0 use=1

IP Configuration

1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: eth1: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:e0:29:3c:34:bd brd ff:ff:ff:ff:ff:ff
    inet 192.168.20.1/24 brd 192.168.20.255 scope global eth1
    inet 192.168.30.1/24 brd 192.168.30.255 scope global eth1
    inet6 fe80::2e0:29ff:fe3c:34bd/64 scope link 
       valid_lft forever preferred_lft forever

IP Stats

1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast   
    47930469   169935   0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    47930469   169935   0       0       0       0      
2: eth1: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:e0:29:3c:34:bd brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    194183926  207004   0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    93859924   191056   0       0       0       0      

/proc

   /proc/version = Linux version 2.6.22.19-grsec2.1.11-vs2.2.0.7 ([EMAIL 
PROTECTED]) (gcc version 4.1.2 20061115 (prerelease) (Debian 4.1.1-21)) #1 SMP 
Sun Apr 13 12:24:43 CEST 2008
   /proc/sys/net/ipv4/ip_forward = 1
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 1
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 1
   /proc/sys/net/ipv4/conf/default/log_martians = 0
   /proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth1/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth1/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth1/rp_filter = 0
   /proc/sys/net/ipv4/conf/eth1/log_martians = 0
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 0
   /proc/sys/net/ipv4/conf/lo/log_martians = 0

Routing Rules

0:      from all lookup 255 
32766:  from all lookup main 
32767:  from all lookup default 

Table 255:

broadcast 127.255.255.255 dev lo  proto kernel  scope link  src 127.0.0.1 
broadcast 192.168.20.255 dev eth1  proto kernel  scope link  src 192.168.20.1 
broadcast 192.168.30.255 dev eth1  proto kernel  scope link  src 192.168.30.1 
local 192.168.20.1 dev eth1  proto kernel  scope host  src 192.168.20.1 
broadcast 192.168.30.0 dev eth1  proto kernel  scope link  src 192.168.30.1 
broadcast 127.0.0.0 dev lo  proto kernel  scope link  src 127.0.0.1 
local 192.168.30.1 dev eth1  proto kernel  scope host  src 192.168.30.1 
local 127.0.0.1 dev lo  proto kernel  scope host  src 127.0.0.1 
local 127.0.0.0/8 dev lo  proto kernel  scope host  src 127.0.0.1 

Table default:


Table main:

192.168.20.0/24 dev eth1  proto kernel  scope link  src 192.168.20.1 
192.168.30.0/24 dev eth1  proto kernel  scope link  src 192.168.30.1 
default via 192.168.20.254 dev eth1 

ARP

? (192.168.20.254) at 00:A0:CC:3F:48:3E [ether] on eth1

Modules

iptable_raw             2516  0 
ipt_ULOG                8820  0 
ipt_TTL                 2437  0 
ipt_ttl                 2010  0 
ipt_TOS                 2361  0 
ipt_tos                 1776  0 
ipt_SAME                2511  0 
ipt_REJECT              4632  4 
ipt_REDIRECT            2206  0 
ipt_recent              9056  0 
ipt_owner               2111  0 
ipt_NETMAP              2181  0 
ipt_MASQUERADE          3762  0 
ipt_LOG                 6236  11 
ipt_iprange             1911  0 
ipt_ECN                 3038  0 
ipt_ecn                 2323  0 
ipt_CLUSTERIP           8686  0 
ipt_ah                  2023  0 
ipt_addrtype            1963  0 
iptable_nat             7378  0 
iptable_mangle          2927  1 
iptable_filter          3112  1 
ip_tables              12429  4 
iptable_raw,iptable_nat,iptable_mangle,iptable_filter

Shorewall has detected the following iptables/netfilter capabilities:
   NAT: Available
   Packet Mangling: Available
   Multi-port Match: Available
   Extended Multi-port Match: Available
   Connection Tracking Match: Available
   Packet Type Match: Available
   Policy Match: Available
   Physdev Match: Available
   Packet length Match: Available
   IP range Match: Available
   Recent Match: Available
   Owner Match: Available
   Ipset Match: Not available
   CONNMARK Target: Available
   Extended CONNMARK Target: Available
   Connmark Match: Available
   Extended Connmark Match: Available
   Raw Table: Available
   IPP2P Match: Not available
   CLASSIFY Target: Available
   Extended REJECT: Available
   Repeat match: Available
   MARK Target: Available
   Extended MARK Target: Available
   Mangle FORWARD Chain: Available

Traffic Control

Device eth1:
qdisc pfifo_fast 0: root bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
 Sent 93840250 bytes 191056 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 


TC Filters

Device eth1:

-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference 
Don't miss this year's exciting event. There's still time to save $100. 
Use priority code J8TL2D2. 
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to